We have deployment with star-topology:
HQ - cluster of FGT-300D (FortiOS 6.4.11)
Spokes - Fortigate 50E (FortiOS 6.2.x), Fortigate 60D (FortiOS 6.0.x), Fortigate 92D (6.2.x), Fortigate 300C (5.2.x)
We have experienced problem with periodically disrupt of dynamic routing (OSPF) with 20-30 spokes. From HQ side status changed to 2-Way, form spokes - ExStart
set-mtu 1300 and set mtu-ignore enable was applyed from all sides
After 3-4 hours problem was fixed by themself. And this repeat periodically
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Do you see any logs under "Router Events" ?
Here is some debug flow in moment of disruption (from Spoke)
2023-02-13 08:03:46 id=20085 trace_id=55 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.249.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:46 id=20085 trace_id=55 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b9, original direction"
2023-02-13 08:03:46 id=20085 trace_id=55 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan2-wan2"
2023-02-13 08:03:46 id=20085 trace_id=55 func=esp_output4 line=899 msg="encrypting, and send to 94.153.136.246 with source 31.128.74.49"
2023-02-13 08:03:46 id=20085 trace_id=55 func=ipsec_output_finish line=232 msg="send to 31.128.74.1 via intf-port2"
2023-02-13 08:03:47 id=20085 trace_id=56 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.129.247:0->224.0.0.5:0) from wan2-wan1. "
2023-02-13 08:03:47 id=20085 trace_id=56 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000002dd, original direction"
2023-02-13 08:03:47 id=20085 trace_id=57 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.239.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:47 id=20085 trace_id=57 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b8, original direction"
2023-02-13 08:03:47 id=20085 trace_id=57 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan2"
2023-02-13 08:03:47 id=20085 trace_id=57 func=esp_output4 line=899 msg="encrypting, and send to 94.153.136.246 with source 94.153.160.230"
2023-02-13 08:03:47 id=20085 trace_id=57 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:47 id=20085 trace_id=58 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.219.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:47 id=20085 trace_id=58 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b6, original direction"
2023-02-13 08:03:47 id=20085 trace_id=58 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan1"
2023-02-13 08:03:47 id=20085 trace_id=58 func=esp_output4 line=899 msg="encrypting, and send to 195.24.148.14 with source 94.153.160.230"
2023-02-13 08:03:47 id=20085 trace_id=58 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:47 id=20085 trace_id=59 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.119.247:0->224.0.0.5:0) from wan1-wan1. "
2023-02-13 08:03:47 id=20085 trace_id=59 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000002ba, original direction"
2023-02-13 08:03:48 id=20085 trace_id=60 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.229.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:48 id=20085 trace_id=60 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b7, original direction"
2023-02-13 08:03:48 id=20085 trace_id=60 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan2-wan1"
2023-02-13 08:03:48 id=20085 trace_id=60 func=esp_output4 line=899 msg="encrypting, and send to 195.24.148.14 with source 31.128.74.49"
2023-02-13 08:03:48 id=20085 trace_id=60 func=ipsec_output_finish line=232 msg="send to 31.128.74.1 via intf-port2"
2023-02-13 08:03:48 id=20085 trace_id=61 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.219.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:48 id=20085 trace_id=61 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b6, original direction"
2023-02-13 08:03:48 id=20085 trace_id=61 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan1"
2023-02-13 08:03:48 id=20085 trace_id=61 func=esp_output4 line=899 msg="encrypting, and send to 195.24.148.14 with source 94.153.160.230"
2023-02-13 08:03:48 id=20085 trace_id=61 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:49 id=20085 trace_id=62 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.229.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:49 id=20085 trace_id=62 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b7, original direction"
2023-02-13 08:03:49 id=20085 trace_id=62 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan2-wan1"
2023-02-13 08:03:49 id=20085 trace_id=62 func=esp_output4 line=899 msg="encrypting, and send to 195.24.148.14 with source 31.128.74.49"
2023-02-13 08:03:49 id=20085 trace_id=62 func=ipsec_output_finish line=232 msg="send to 31.128.74.1 via intf-port2"
2023-02-13 08:03:50 id=20085 trace_id=63 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.239.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:50 id=20085 trace_id=63 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b8, original direction"
2023-02-13 08:03:50 id=20085 trace_id=63 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan2"
2023-02-13 08:03:50 id=20085 trace_id=63 func=esp_output4 line=899 msg="encrypting, and send to 94.153.136.246 with source 94.153.160.230"
2023-02-13 08:03:50 id=20085 trace_id=63 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:50 id=20085 trace_id=64 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.249.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:50 id=20085 trace_id=64 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b9, original direction"
2023-02-13 08:03:50 id=20085 trace_id=64 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan2-wan2"
2023-02-13 08:03:50 id=20085 trace_id=64 func=esp_output4 line=899 msg="encrypting, and send to 94.153.136.246 with source 31.128.74.49"
2023-02-13 08:03:50 id=20085 trace_id=64 func=ipsec_output_finish line=232 msg="send to 31.128.74.1 via intf-port2"
2023-02-13 08:03:52 id=20085 trace_id=65 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.239.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:52 id=20085 trace_id=65 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b8, original direction"
2023-02-13 08:03:52 id=20085 trace_id=65 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan2"
2023-02-13 08:03:52 id=20085 trace_id=65 func=esp_output4 line=899 msg="encrypting, and send to 94.153.136.246 with source 94.153.160.230"
2023-02-13 08:03:52 id=20085 trace_id=65 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:52 id=20085 trace_id=66 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.219.247:0->224.0.0.5:0) from local. "
2023-02-13 08:03:52 id=20085 trace_id=66 func=resolve_ip_tuple_fast line=4552 msg="Find an existing session, id-000000b6, original direction"
2023-02-13 08:03:52 id=20085 trace_id=66 func=ipsecdev_hard_start_xmit line=121 msg="enter IPsec interface-wan1-wan1"
2023-02-13 08:03:52 id=20085 trace_id=66 func=esp_output4 line=899 msg="encrypting, and send to 195.24.148.14 with source 94.153.160.230"
2023-02-13 08:03:52 id=20085 trace_id=66 func=ipsec_output_finish line=232 msg="send to 94.153.160.229 via intf-port1"
2023-02-13 08:03:54 id=20085 trace_id=67 func=print_pkt_detail line=4489 msg="vd-root received a packet(proto=89, 172.30.139.247:0->224.0.0.5:0) from wan1-wan2. "
Here is some debug from OSPF in moment of disruption (from Spoke)
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan1-wan1:172.30.219.247-0.0.0.1]: DD Retransmit timer expire"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: SEND[DD]: To 224.0.0.5 via wan1-wan1:172.30.219.247, length 48"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Type 2 (Database Description)"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 32"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Router ID 10.9.247.1"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 16974"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Database Description"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Interface MTU 1300"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Options 0x42 (*|O|-|-|-|-|E|-)"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Bits 7 (-|I|M|MS)"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: Sequence Number 0x00004629"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: # LSA Headers 0"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: IFSM[VLAN-SCADA:172.20.148.254]: Hello timer expire"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: RECV[Hello]: From 0.0.0.1 via wan1-wan2:172.30.239.247 (172.30.139.247 -> 224.0.0.5)"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Type 1 (Hello)"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 48"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Router ID 0.0.0.1"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 144315"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Hello"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: NetworkMask 255.255.255.255"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: HelloInterval 10"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Options 0x2 (*|-|-|-|-|-|E|-)"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: RtrPriority 1"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: RtrDeadInterval 40"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: DRouter 0.0.0.0"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: BDRouter 0.0.0.0"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: # Neighbors 1"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: Neighbor 10.9.247.1"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan1-wan2:172.30.239.247-0.0.0.1]: ExStart (HelloReceived)"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan1-wan2:172.30.239.247-0.0.0.1]: nfsm_ignore called"
2023-02-13 08:05:23 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan1-wan2:172.30.239.247-0.0.0.1]: ExStart (2-WayReceived)"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan2-wan1:172.30.229.247-0.0.0.1]: DD Retransmit timer expire"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: SEND[DD]: To 224.0.0.5 via wan2-wan1:172.30.229.247, length 48"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Type 2 (Database Description)"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 32"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Router ID 10.9.247.1"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 5454"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Database Description"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Interface MTU 1300"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Options 0x42 (*|O|-|-|-|-|E|-)"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Bits 7 (-|I|M|MS)"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: Sequence Number 0x000042fe"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: # LSA Headers 0"
2023-02-13 08:05:24 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan2-wan2:172.30.249.247-0.0.0.1]: DD Retransmit timer expire"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: SEND[DD]: To 224.0.0.5 via wan2-wan2:172.30.249.247, length 48"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Type 2 (Database Description)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 32"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Router ID 10.9.247.1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 5455"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Database Description"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Interface MTU 1300"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Options 0x42 (*|O|-|-|-|-|E|-)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Bits 7 (-|I|M|MS)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Sequence Number 0x00004307"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: # LSA Headers 0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: IFSM[LAN:172.20.48.254]: Hello timer expire"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: LSA[Refresh]: timer expired"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: IFSM[wan2-wan2:172.30.249.247]: Hello timer expire"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: SEND[Hello]: To 224.0.0.5 via wan2-wan2:172.30.249.247, length 64"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Type 1 (Hello)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 48"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Router ID 10.9.247.1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 5456"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Hello"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NetworkMask 255.255.255.255"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: HelloInterval 10"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Options 0x2 (*|-|-|-|-|-|E|-)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: RtrPriority 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: RtrDeadInterval 40"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: DRouter 0.0.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: BDRouter 0.0.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: # Neighbors 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Neighbor 0.0.0.1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: RECV[Hello]: From 0.0.0.1 via wan2-wan1:172.30.229.247 (172.30.129.247 -> 224.0.0.5)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Header"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Version 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Type 1 (Hello)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Packet Len 48"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Router ID 0.0.0.1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Area ID 10.9.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Checksum 0x0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: AuType 2"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Cryptographic Authentication"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Key ID 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Auth Data Len 16"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Sequence number 146034"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Hello"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NetworkMask 255.255.255.255"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: HelloInterval 10"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Options 0x2 (*|-|-|-|-|-|E|-)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: RtrPriority 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: RtrDeadInterval 40"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: DRouter 0.0.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: BDRouter 0.0.0.0"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: # Neighbors 1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: Neighbor 10.9.247.1"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan2-wan1:172.30.229.247-0.0.0.1]: ExStart (HelloReceived)"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan2-wan1:172.30.229.247-0.0.0.1]: nfsm_ignore called"
2023-02-13 08:05:25 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan2-wan1:172.30.229.247-0.0.0.1]: ExStart (2-WayReceived)"
2023-02-13 08:05:26 id=20301 logdesc="Routing log" msg="OSPF: RECV[Hello]: From 0.0.0.1 via wan2-wan2:172.30.249.247 (172.30.149.247 -> 224.0.0.5)"
2023-02-13 08:05:26 id=20301 logdesc="Routing log" msg="OSPF: -----------------------------------------------------"
Hello,
I can see retransmits in the OSPF logs:
2023-02-13 08:05:22 id=20301 logdesc="Routing log" msg="OSPF: NFSM[wan1-wan1:172.30.219.247-0.0.0.1]: DD Retransmit timer expire
I suspect that the issue is caused by packets drops on IPsec tunnels. In order to isolate the issue you may consider to perform steps below:
- check whether tunnels were going down when the issue was triggered
- in case tunnel didn't go down you may consider to sniff traffic (OSPF) on hub and spoke and check whether OSPF hello packets were sent/received by hub and spoke
- in case OSPF Hello packets were sent but not received you may consider to run the commands below on hub and spoke and check for the errors:
diagnose netlink interface list <Phase 1 name>
get vpn ipsec tunnel details
diag npu <NP type> dce <index>
Today's disruption affected all spokes... All OSPF-interfaces entered in 2-Way (HQ) and ExStart (Spokes) status and was until admin initiate reboot of HQ cluster.
After that problem has been fixed
How can I add log files to this post?
You can use the attachment option while replying.
Unfortunately I can't find supported attachment file type
txt, log, conf, zip - are not supported
Problem was solved by downgrading to previous FW
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.